ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-55443B192A29
|
Infrastructure Scan
ADDRESS: 0xf827725498e6fcf62d331566965f5254bcda081f
DEPLOYED: 2026-05-01 01:16:11
LAST_TX: 2026-05-01 17:38:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Stack depth: 2 / 1024. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0x143d9ee6d2386fe1fbab1a2fbea3af2932a71210. [TRACE] Stack trace saved to /logs/TRD-63A6CD77.log. [VALID] No critical memory leaks during simulation. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd03166b09de2b2ed351c6484312a0ca6da95f9a5 0x4d768487f9782fa4e18d5d6cde435930a116c082 0xaa4d1af08e0ffbfda02b4bce169f1a5e3a9ba09d 0xbd6f652f9149911452452a48a91fcc69bb0665ca 0x6bdc767e90767808b4b39965869db822257274e0 0x9d9dd0002a014e82d8a8d3a2d2d453253b489767 0x5e5ad73353ae719b2858d275dfb3af8731d0853b 0xf232ec04534efcec1b0ae249183fb05e6efa9a36 0xd60cbfd3c244c807d91fc2b621cacecac8ea1dfe 0x4427dae8d560dc7beb2794f31d1ccabf6524a74e 0x12a2f8182c3d39f17006f217c2a41734ee6ba7c9 0x998831f80493c9f99adaf6b083281304baf0518c 0x695ee5651cc459af44ad104c538ced1126926f65 0x8c52ad608d7d47eb9b6b7484c5f3ff89da910561 0xc6293d5d7c578d7d6d10c0d651c19e54a280cf10 0xf24f99795d1cb1f0816101d4e0a41a84b44ac8c3 0x493c56ef27e2d6db707314fdd2d20f3b254f8357 0x78cb3035f1118167f75988a752a3e86c930d282c 0xb230489e3db424be5f8606c5dd40b8eaadf847cc 0x97504dd9540ab94177d926c45d726855df38e56b
